Sciweavers

1631 search results - page 180 / 327
» Classifying Software Components Using Design Characteristics
Sort
View
108
Voted
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 6 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
106
Voted
JUCS
2010
83views more  JUCS 2010»
15 years 1 months ago
Developing Augmented Objects: A Process Perspective
: There are many examples of augmented objects in the literature. Augmented objects should provide intelligence to the ambient where they are located and also they must require a l...
Luis A. Guerrero, Hector Horta, Sergio F. Ochoa
125
Voted
VLSID
2008
IEEE
166views VLSI» more  VLSID 2008»
16 years 3 months ago
Exploring the Processor and ISA Design for Wireless Sensor Network Applications
Power consumption, physical size, and architecture design of sensor node processors have been the focus of sensor network research in the architecture community. What lies at the ...
Shashidhar Mysore, Banit Agrawal, Frederic T. Chon...
122
Voted
ICWS
2008
IEEE
15 years 4 months ago
Dynamic Exception Handling Based on Web Services and OPC XML-DA
Programmable Logic Controllers (PLC) are widely used in process automation due to their fast and guarantee response time. However their programming and interfacing capacities are ...
Francisco Javier Díez, Iñaki Maurtua
100
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Is Code Still Moving Around? Looking Back at a Decade of Code Mobility
In the mid-nineties, mobile code was on the rise and, in particular, there was a growing interest in autonomously moving code components, called mobile agents. In 1997, we publish...
Antonio Carzaniga, Gian Pietro Picco, Giovanni Vig...